Have a user using Outlook 2003 on WinXP Pro. User is set up with a signature that is preset as her default when she opens a new email. She use to be able to go to Insert where she would have a Signature option and when she would place her cursor over it, she could [...]
Answer Question | January 26, 2010 8:08 PM
Outlook 2003, Signatures
How to ensure that our AV software can handle the latest Virus defination. Is there any global repositories where these viruses are defined and which can be used for Testing?[o:p][/o:p]
Answer Question | January 15, 2010 9:57 AM
Antivirus software, Manual Testing, Quality assurance, Virus Definitions
a. How does enabling Windows Firewall affect working of Anti Virus Software? What Functionality to test in Anti Virus Software if the Windows Firewall is enabled and What Functionality to test if Windows Firewall is Disabled?
Answer Question | December 31, 2009 9:54 AM
Antivirus software, Firewalls, Windows firewall
we have external sites with different subnets that want to access our internal website, but they can not PING website server. ISA server does not allow extranet access to internal webserver. Please guide me. Thanks.
Answer Question | January 10, 2010 7:56 AM
Extranet, ISA Server, Subnets
i am enable automatic update from change the setting option – client managment – conffigure option – Schedule Update and then check the radios buttun every hours or missing event try afrte 60 m[Br _extended=”true” />in my Symantic Endpoint protaction, But Symantic endpoint protaction antivers not update automaticaly[Br _extended=”true” />. Please give me appropriately solution [...]
Answer Question | December 30, 2009 4:47 PM
Antivirus, Symantec, Symantec Endpoint Protection
I’m trying to debug a bath program. But, I don’t have authority to the job. Here’s the error mesage: Additional Message Information Message ID . . . . . . : CPF3676 Severity . . . . . . . : 30 Message type . . . . . : Diagnostic Date [...]
Answer Question | March 3, 2010 4:16 PM
AS/400, authority issue, iSeries, Security
Hello we have in our group one HQ and 3 branches and we don,t have any infrastructure so ihave to start from zero and we have in each location ADSL internet line my questions : 1- i want to create Active directory in HQ what the best way to create child domain in branches or [...]
Answer Question | December 30, 2009 12:29 PM
Active Directory, Exchange, ISA, VPN
I am using Cisco Packet Tracer 5.2 for study, it seem to be good. I have configure Intervaln routing on 3 coreswitches which is workign fine with vast topology. I tried to place one router 2811 as a firewall between my wan and lan. But i am not able to ping from router to core [...]
Answer Question | January 6, 2010 4:37 AM
Cisco 2811, Cisco 3560, Cisco networks, Cisco Packet Tracer, InterVLAN, InterVLAN Routing
Hi, I have configured ISA 2006 trail version on member server in my domain environment, it has blocked all the websites by d-fault. I have opened all the websites for my intranet users then it is allowing me to access all the websites properly. But when I opened only 3 websites for my intranet users, those are Gmail.com.,Rediff.com [...]
Answer Question | September 11, 2012 2:50 AM
ISA, ISA 2006, Microsoft ISA Server, Windows Server 2003, Windows Server 2003 SP2
How to conduct an IT General Controls Audit for a Holdings & Investments Company and a Real Estate Company (Developers) using HP Servers, Windows 2008, windows 2003 (backend) and Red Hat Operating Systems.
Answer Question | March 27, 2012 6:47 AM
Controls Audit, IT auditing, IT audits, Red Hat, Windows Server 2003, Windows Server 2008
I want to config a router to deny any use for TCP port 80. How can I do that?
Answer Question | December 25, 2009 7:04 PM
Access List, Deny Access, router
I was having some fun reading about Certificates, and realized I could see them in my browser. Anyways, I noticed at my bank it has something called “fingerprints” associated to it. Does this mean I can use my fingerprint reader to login?
Answer Question | December 18, 2009 3:24 PM
Active Directory, Certificate, Fingerprint authentication, Security
What is router-on-a-stick configuration?
Answer Question | April 25, 2012 7:25 PM
configuration, Networking, Router-on-a-stick Configuration
In my small business network I have an ISP modem, then a Sonicwall NSA 240 firewall, and then a Linksys WAP 2000 access point (AP). Can I install a network access storage (NAS) device, like a D-Link DNS-343, to the network for all employees to share, store and back up files? And if so, where [...]
Answer Question | August 19, 2010 7:16 PM
D-Link, Firewalls, modem, Network Access Storage device, Networking
Hello All, Can anybody tell me the part number of 256MB memory module for Cisco ASA5510 Firewall?
Answer Question | January 7, 2010 10:29 AM
Cisco, Cisco ASA, Cisco ASA 5510
Hi There I’ve removed the anti-spoofing on one of the interfaces to a firewall, but when I go to install the policy I get the error message below: The Topology information must be configured for object *****, interface eth-s*p*c*, in order to use the Anti-Spoofing feature. Can anyone assitt? Many Thanks Amanda
Answer Question | December 30, 2009 10:22 AM
Anti-spoofing, Check Point, Check Point NGX R60, Firewalls, R60
I know when setting up Small Business Server 2008 on a workstation, you simply go to an internal web address that downloads the client software to the machine that is used to verify the credentials and to log onto the server. However, my question is when doing this, does this block any non-server user of [...]
Answer Question | July 15, 2010 9:17 PM
Client Access, Login, Notebook computers, SBS 2008, Workstations
Here are the 10 most watched questions on ITKE: There’s some great discussion going on. Go answer a question now! 1. Ak1bo78 asks for a C# how to on IF Statement’s, which Mshen and CarlosDL help create. 2. Dbsi2006 asks for help on how to map drives without UNC, which Rklanke, MrDenny, KevinBeaver and CarlosDL [...]
Answer Question | December 15, 2009 2:13 PM
AS/400, Channel, CIO, CRM, databse, DataCenter, DataManagement, Development, Exchange, ITKE, Linux, Lotus Domino, Microsoft Windows, Mobile, Networking, Oracle, SAP, Security, SQL Server, Stroage, Virtualization, VoIP
Good day all, I am new in the application development world as a Business Analyst. Please pardon my ignorance, Kindly attend to my question. What type of access does an administrator/super administrator have on a system/application? i.e. what can be done and not done?
Answer Question | December 15, 2009 11:18 AM
Administrative privileges, Application development, Application security
Hi all, please how can i edit my ISA server to permit one host to browse internet always. i have it configured to only allow users to browse internet between the hours of 12 noon to 1 noon, but now i only wants to allow a particular PC to use ISA and have internet access [...]
Answer Question | September 11, 2012 9:24 AM
ISA Server, Windows Server 2003